@manyos/smileconnect-api 1.47.0 → 1.48.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/app.js CHANGED
@@ -50,6 +50,7 @@ const https = require('https');
50
50
  const maxHTTPSockets = process.env.MAX_HTTP_SOCKETS || 10;
51
51
 
52
52
  const SSO_CLIENTNAME_ATTRIBUTE = process.env.SSO_CLIENTNAME_ATTRIBUTE || 'azp';
53
+ const SSO_USERNAME_ATTRIBUTE = process.env.SSO_USERNAME_ATTRIBUTE || 'preferred_username';
53
54
 
54
55
  http.globalAgent.maxSockets = maxHTTPSockets;
55
56
  https.globalAgent.maxSockets = maxHTTPSockets;
@@ -157,7 +158,7 @@ passport.use(
157
158
  'scope': jwt_payload.scope,
158
159
  'exp': jwt_payload.exp,
159
160
  'config': clientConfig,
160
- 'username': jwt_payload.preferred_username
161
+ 'username': jwt_payload[SSO_USERNAME_ATTRIBUTE]
161
162
  }
162
163
  log.debug('Passport User', jwt_payload);
163
164
  const resource_access = jwt_payload.resource_access;
@@ -86,6 +86,16 @@ Sample:
86
86
 
87
87
  *SSO_CLIENTNAME_ATTRIBUTE = "preferred_username"*
88
88
 
89
+ ### SSO_USERNAME_ATTRIBUTE
90
+
91
+ The attribute that contains the user name in the token. User name is used to identify admins. It is only needed for configuration.
92
+
93
+ Default: *preferred_username*
94
+
95
+ Sample:
96
+
97
+ *SSO_CLIENTNAME_ATTRIBUTE = "email"*
98
+
89
99
  ### ADMIN_USERS
90
100
 
91
101
  List of users who are allowed to access /v1/appconfig endpoints.
@@ -267,6 +277,34 @@ Sample:
267
277
 
268
278
  *SSO_ISSUER=https://sso.mydomain.io/auth/realms/itsmproxy*
269
279
 
280
+ ### SSO_CLIENTNAME_ATTRIBUTE
281
+
282
+ The attribute that contains the client name in the token.
283
+
284
+ Default: *azp*
285
+
286
+ Set this value if you only want to use a single client in the SSO and service accounts as clients in SMILEconnect. This can be used to manage your SMILEconnect clients via a directory service like LDAP/AD. [More Info](https://datatracker.ietf.org/doc/html/rfc6749#section-1.3.3)
287
+
288
+ Sample:
289
+
290
+ *SSO_CLIENTNAME_ATTRIBUTE = "preferred_username"*
291
+
292
+ ### SSO_USERNAME_ATTRIBUTE
293
+
294
+ The attribute that contains the user name in the token. User name is used to identify admins. It is only needed for configuration.
295
+
296
+ Default: *preferred_username*
297
+
298
+ Sample:
299
+
300
+ *SSO_CLIENTNAME_ATTRIBUTE = "email"*
301
+
302
+ ### ADMIN_USERS
303
+
304
+ List of users who are allowed to access /v1/appconfig endpoints.
305
+
306
+ Sample:
307
+ ADMIN_USERS=username1, username2
270
308
 
271
309
  ## Logging
272
310
 
@@ -306,6 +344,22 @@ The URL of the OIDC Provider for user authentication
306
344
  Sample:
307
345
  *REACT_APP_SSO_URL=https://sso.mydomain.io/auth/realms/itsmproxy*
308
346
 
347
+ since version 1.5.2:
348
+ For manual OICD endpoint configuration you must provide all of the following parameters:
349
+ *REACT_APP_OIDC_AUTHORIZATION_ENDPOINT=https://sso.mydomain.io/auth/realms/itsmproxy/protocol/openid-connect/auth*
350
+ *REACT_APP_OIDC_USERINFO_ENDPOINT=https://sso.mydomain.io/auth/realms/itsmproxy/protocol/openid-connect/userinfo*
351
+ *REACT_APP_OIDC_END_SESSION_ENDPOINT=https://sso.mydomain.io/auth/realms/itsmproxy/protocol/openid-connect/logout*
352
+ *REACT_APP_OIDC_JWKS_URI=https://sso.mydomain.io/auth/realms/itsmproxy/protocol/openid-connect/certs*
353
+ *REACT_APP_OIDC_TOKEN_ENDPOINT=https://sso.mydomain.io/auth/realms/itsmproxy/protocol/openid-connect/token*
354
+
355
+ To allow Authorization Flow with PKCE set
356
+ REACT_APP_OIDC_RESPONSE_TYPE=code
357
+ Default value is "token id_token", which uses Implicit Flow.
358
+
359
+ Use REACT_APP_OIDC_TOKEN to choose the token to use. Default is access_token
360
+
361
+ Use REACT_APP_OIDC_SCOPE to choose the oidc scope
362
+
309
363
  ## GUI
310
364
 
311
365
  ### REACT_APP_GUI_URL
package/docs/openapi.json CHANGED
@@ -4479,7 +4479,9 @@
4479
4479
  "OIDC": [
4480
4480
  ]
4481
4481
  }
4482
- ]
4482
+ ],
4483
+ "summary": "Get a single record",
4484
+ "description": "Receive a single record from a custom form, identified by its id."
4483
4485
  },
4484
4486
  "put": {
4485
4487
  "requestBody": {
@@ -4505,7 +4507,9 @@
4505
4507
  "OIDC": [
4506
4508
  ]
4507
4509
  }
4508
- ]
4510
+ ],
4511
+ "summary": "Update a record",
4512
+ "description": "Update a single record on a custom form, identified by its id."
4509
4513
  },
4510
4514
  "parameters": [
4511
4515
  {
package/docs/releases.md CHANGED
@@ -2,8 +2,12 @@
2
2
 
3
3
  ## API
4
4
 
5
+ ### 1.48.0 - 03.11.21
6
+ Add parameter SSO_USERNAME_ATTRIBUTE to config.
7
+
5
8
  ### 1.47.0 - 22.10.21
6
9
  Add xmlParser to scripts.
10
+
7
11
  See https://www.npmjs.com/package/fast-xml-parser
8
12
 
9
13
  Add customForms
@@ -13,6 +17,7 @@ Fix known issue: Check for activation Task Phase and activate if reached
13
17
 
14
18
  ### 1.46.3 - 18.10.21
15
19
  Fix issue: Task not activated when phase already active
20
+
16
21
  Known issues: Tasks might get activated early
17
22
 
18
23
  ### 1.46.2 - 14.10.21
@@ -47,7 +52,9 @@ Allow also "isPublic": "true" instead of "isPublic": true for Ticket Worklogs
47
52
 
48
53
  ### 1.43.0 - 20.09.21
49
54
  Allow bypassCache option in Remedy Adapter
55
+
50
56
  Add support for Task Phasing
57
+
51
58
  Regenrate Task Flow on Task Update
52
59
 
53
60
  ### 1.42.1 - 09.09.21
@@ -59,7 +66,9 @@ Add IDs to POST Actions for After Execution Scripts
59
66
  ### 1.41.4 - 10.08.21
60
67
 
61
68
  Fix mapping for Ticket Worklogs
69
+
62
70
  Fix mapping for Task Worklogs
71
+
63
72
  Fix issue with sort in Remedy Adapter
64
73
 
65
74
  ### 1.41.0 - 03.08.21
@@ -78,6 +87,9 @@ e.g.
78
87
 
79
88
  ## Event Manager
80
89
 
90
+ ### 1.18.0 - 03.11.21
91
+ Add parameter SSO_USERNAME_ATTRIBUTE to config.
92
+
81
93
  ### 1.17.1 - 01.10.21
82
94
  Fix issue: TicketNumber3 added to Event Data
83
95
 
@@ -94,6 +106,22 @@ Update Record added to [Remedy Adapter](adapter#remedy).
94
106
  The eventmanager will check all outbound webhooks for an event. If one fails, the whole Event will be set to error and the details will be added to the error message.
95
107
 
96
108
  ## GUI
109
+ ### 1.5.5 - 03.11.21
110
+ Add Parameter REACT_APP_OIDC_SCOPE to choose the oicd scope
111
+
112
+ ### 1.5.4 - 03.11.21
113
+ Add Parameter REACT_APP_OIDC_TOKEN to choose the token to use (access_token/id_token)
114
+
115
+ ### 1.5.3 - 03.11.21
116
+ Allow Authorization Flow with PKCE. Added Parameter: REACT_APP_OIDC_RESPONSE_TYPE.
117
+ Default value is "token id_token". To use Authorization Flow with PKCE you need to set "REACT_APP_OIDC_RESPONSE_TYPE=code"
118
+
119
+ ### 1.5.2 - 03.11.21
120
+ Fix: OIDC Endpoints URL are wrong for some OIDC Providers. Also added parameters for manual endpoint configuration
121
+
122
+ ### 1.5.1 - 22.10.21
123
+ Custom Forms added
124
+
97
125
 
98
126
  ### 1.4.18 - 11.08.21
99
127
  hovering on fields in mappingtable, destroys values in "new" mapping, in some situations
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@manyos/smileconnect-api",
3
- "version": "1.47.0",
3
+ "version": "1.48.0",
4
4
  "description": "A proxy and abstraction layer for BMCs IT Service Management Suite",
5
5
  "main": "app.js",
6
6
  "scripts": {